The first 50 hours working at Valor Cybersecurity have been far more fruitful than I could have anticipated; from being exposed to the fundamentals of cloud computing and helping orchestrate the beginning framework for the development of a secure portal, to familiarizing myself with the basics of the Cybersecurity Maturity Model Certification (CMMC) framework that defense contractors must adhere to. This role has allowed me to work closely with the defense sector, providing me with the opportunity to observe defense contract operations from a supporting role while developing cybersecurity architecture within CMMC compliance.
Understanding the services Valor Cybersecurity provided was crucial to getting briefed and involved quickly. My military background and experience working as a defense contractor gave me a solid foundation to hit the ground running when brushing up on CMMC and how this organization interacts with clients. Entering with this level of experience was precisely why I was able to shift my focus from deep diving into CMMC documentation to Microsoft Azure’s cloud computing fundamentals.
Earning experience with cloud computing services like Microsoft Azure by contributing to this project gives me a competitive edge in the job market, especially if it results in earning the Microsoft Azure certification. Thus far, with guidance from my colleagues and Mr. Tomchick, I’ve been exposed to the fundamentals of cloud computing, and moving forward, I anticipate establishing proficiency in network security and architecture by helping design the framework for Valor Cybersecurity’s secure software solution.
Following several days of independent research to gain familiarity with both the organization and Microsoft Azure, I was tasked with developing a project plan for a software-based enterprise dubbed ValorVictor. This project required a comprehensive understanding of the company’s operations to effectively translate them into a secure, online portal supported by Azure applications. My focus has shifted from formulating abstract concepts of potential solutions to developing a structured framework, rooted in the established cybersecurity best practices gathered during my undergraduate studies and CMMC guidelines. This work marks my first opportunity to implement my knowledge in a practical, real-world context.
The next 50 hours at Valor will be spent finalizing the framework and collaborating with Valor Cybersecurity’s Jackson Walker, a senior employee tasked with showing me the ropes. Working closely with Jackson, we’ll begin dynamically implementing cloud service resources with CMMC-compliant security controls to construct a secure portal that Valor can utilize for streamlining client documentation and paperwork, improving efficiency, and aiding with scalability.